Edge Weight Prediction in Weighted Signed Networks S Kumar, F Spezzano, VS Subrahmanian, C Faloutsos International Conference on Data Mining (ICDM), 2016 | 414 | 2016 |
Vews: A wikipedia vandal early warning system S Kumar, F Spezzano, VS Subrahmanian Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015 | 99 | 2015 |
Accurately detecting trolls in slashdot zoo via decluttering S Kumar, F Spezzano, VS Subrahmanian 2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014 | 83 | 2014 |
Incomplete data and data dependencies in relational databases S Greco, C Molinaro, F Spezzano Synthesis Lectures on Data Management 4 (5), 1-123, 2012 | 70 | 2012 |
Stratification criteria and rewriting techniques for checking chase termination S Greco, F Spezzano, I Trubitsyna Proceedings of the VLDB Endowment 4 (11), 1158-1168, 2011 | 45 | 2011 |
Chase termination: A constraints rewriting approach S Greco, F Spezzano Proceedings of the VLDB Endowment 3 (1-2), 93-104, 2010 | 41 | 2010 |
Diffusion centrality: A paradigm to maximize spread in social networks C Kang, S Kraus, C Molinaro, F Spezzano, VS Subrahmanian Artificial Intelligence 239, 70-96, 2016 | 40 | 2016 |
Multi-modal social and psycho-linguistic embedding via recurrent neural networks to identify depressed users in online forums A Shrestha, E Serra, F Spezzano Network Modeling Analysis in Health Informatics and Bioinformatics 9, 1-11, 2020 | 24 | 2020 |
Reshaping terrorist networks F Spezzano, VS Subrahmanian, A Mannes Communications of the ACM 57 (8), 60-69, 2014 | 22 | 2014 |
Spam Users Identification in Wikipedia via Editing Behavior T Green, F Spezzano Proceedings of the Eleventh International Conference on Web and Social Media …, 2017 | 21 | 2017 |
Detecting suspicious entities in offshore leaks networks M Joaristi, E Serra, F Spezzano Social Network Analysis and Mining 9, 1-15, 2019 | 20 | 2019 |
Detecting fake news spreaders in social networks via linguistic and personality features A Shrestha, F Spezzano, A Joy Working Notes of CLEF 2020-Conference and Labs of the Evaluation Forum, 2020 | 19 | 2020 |
STONE: shaping terrorist organizational network efficiency F Spezzano, VS Subrahmanian, A Mannes Proceedings of the 2013 ieee/acm international conference on advances in …, 2013 | 18 | 2013 |
Online misinformation: from the deceiver to the victim A Shrestha, F Spezzano Proceedings of the 2019 IEEE/ACM International Conference on Advances in …, 2019 | 17 | 2019 |
Checking chase termination: Cyclicity analysis and rewriting techniques S Greco, F Spezzano, I Trubitsyna IEEE Transactions on Knowledge and Data Engineering 27 (3), 621-635, 2014 | 17 | 2014 |
On the termination of logic programs with function symbols S Greco, F Spezzano, I Trubitsyna Technical Communications of the 28th International Conference on Logic …, 2012 | 17 | 2012 |
Deeptrust: An automatic framework to detect trustworthy users in opinion-based systems E Serra, A Shrestha, F Spezzano, A Squicciarini Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 16 | 2020 |
Inferring Bad Entities through the Panama Papers Network M Joaristi, E Serra, F Spezzano | 15 | 2018 |
Detecting depressed users in online forums A Shrestha, F Spezzano Proceedings of the 2019 IEEE/ACM International Conference on Advances in …, 2019 | 14 | 2019 |
Checking termination of bottom-up evaluation of logic programs with function symbols M Calautti, S Greco, F Spezzano, I Trubitsyna Theory and Practice of Logic Programming 15 (6), 854-889, 2015 | 14 | 2015 |